Filters
Question type

Study Flashcards

Which port number is commonly used for the Hypertext Transfer Protocol service.


A) 25
B) 53
C) 80
D) 8080

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Which of the following access control processes confirms the identity of the entity seeking access to a logical or physical area?


A) Identification
B) Authentication
C) Authorization
D) Accountability

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

You might put a proxy server in the __________________,which is exposed to the outside world,neither in the trusted nor untrusted network.

Correct Answer

verifed

verified

demilitari...

View Answer

Public key container files that allow PKI system components and end usersto validate a public key and identify its owner.


A) VPN
B) transport mode
C) SSL
D) PKI
E) digital certificate
F) asymmetric encryption
G) Vernam cipher
H) transposition cipher
I) content filter
J) footprinting

K) G) and I)
L) A) and G)

Correct Answer

verifed

verified

____________________ presents a threat to wireless communications,a practice that makes it prudent to use a wireless encryption protocol to prevent unauthorized use of your Wi-Fi network.

Correct Answer

verifed

verified

Which port number is commonly used for the Simple Mail Transfer Protocol service?


A) 25
B) 53
C) 68
D) 443

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

The organized research and investigation of Internet addresses owned orcontrolled by a target organization.


A) VPN
B) transport mode
C) SSL
D) PKI
E) digital certificate
F) asymmetric encryption
G) Vernam cipher
H) transposition cipher
I) content filter
J) footprinting

K) A) and D)
L) B) and D)

Correct Answer

verifed

verified

Describe and provide an example for each of the types of authentication mechanisms.

Correct Answer

verifed

verified

There are three types of authentication ...

View Answer

Briefly describe how biometric technologies are generally evaluated.

Correct Answer

verifed

verified

Biometric technologies are generally eva...

View Answer

What tool would you use if you want to collect information as it is being transmitted on the network and analyze the contents for the purpose of solving network problems?


A) Port scanner
B) Packet sniffer
C) Vulnerability scanner
D) Content filter

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

What should you look for when selecting a firewall for your network?

Correct Answer

verifed

verified

1.What type of firewall technology offer...

View Answer

The ___________ wireless security protocol was replaced by stronger protocols due to several vulnerabilities found in the early 2000s.

Correct Answer

verifed

verified

WEP wired ...

View Answer

A private,secure network operated over a public and insecurenetwork.


A) VPN
B) transport mode
C) SSL
D) PKI
E) digital certificate
F) asymmetric encryption
G) Vernam cipher
H) transposition cipher
I) content filter
J) footprinting

K) D) and F)
L) A) and E)

Correct Answer

verifed

verified

The ability to restrict specific services is a common practice in most modern routers,and is invisible to the user.

A) True
B) False

Correct Answer

verifed

verified

Which of the following provides an identification card of sorts to clients who request services in a Kerberos system?


A) Ticket Granting Service
B) Authentication Server
C) Authentication Client
D) Key Distribution Center

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

A(n)____________________ token uses a challenge-response system in which the server challenges the user with a number,that when entered into the token provides a response that provides access.

Correct Answer

verifed

verified

A cryptographic method that incorporates mathematical operationsinvolving both a public key and a private key to encipher or decipher a message.


A) VPN
B) transport mode
C) SSL
D) PKI
E) digital certificate
F) asymmetric encryption
G) Vernam cipher
H) transposition cipher
I) content filter
J) footprinting

K) A) and G)
L) F) and I)

Correct Answer

verifed

verified

In IPSec,an encryption method in which only a packet's IP data is encrypted,?not the IP headers themselves; this method allows intermediate nodes to read the source and?destination addresses.


A) VPN
B) transport mode
C) SSL
D) PKI
E) digital certificate
F) asymmetric encryption
G) Vernam cipher
H) transposition cipher
I) content filter
J) footprinting

K) F) and I)
L) A) and C)

Correct Answer

verifed

verified

What is the range of the well-known ports used by TCP and UDP?


A) 1024-65,536
B) 0-1023
C) 0-65,536
D) 20, 21, 25, 53, 80

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

What is a packet sniffer and how can it be used for good or nefarious purposes?

Correct Answer

verifed

verified

A packet sniffer is a network tool that ...

View Answer

Showing 41 - 60 of 61

Related Exams

Show Answer